The Double Transposition Cipher
Back to Crack the Ciphers
This was one of the most secure hand ciphers used in the Second World War. It was used by both the Allies and the Axis, and served both well. Its main weakness was that if the attacker intercepted two or more messages of the same length using the same key, they could be compared by a tedious process known as "multiple anagramming," finding solutions to both. This weakness was not important if only one message was sent using each key. It had an additional problem: Executing it correctly requires considerable care, leading to difficulties in decryption if an error is made at a sensitive point. In the United States, information about cryptanalysis of the cipher remained classified until a few years ago.
Double Transposition consists of two applications of columnar transposition to a message. The two applications may use the same key for each of the two steps, or they may use different keys.
Columnar transposition works like this: First pick a keyword, such as DESCRIBE, then write the message under it in rows: